Security Team Weekly Summary: December 21, 2017

Canonical

on 21 December 2017

This article is more than 7 years old.


The Security Team weekly reports are intended to be very short summaries of the Security Team’s weekly activities.

If you would like to reach the Security Team, you can find us at the #ubuntu-hardened channel on FreeNode. Alternatively, you can mail the Ubuntu Hardened mailing list at: [email protected]

During the last week, the Ubuntu Security team:

  • Triaged 301 public security vulnerability reports, retaining the 47 that applied to Ubuntu.
  • Published 5 Ubuntu Security Notices which fixed 3 security issues (CVEs) across 7 supported packages.

Ubuntu Security Notices

Bug Triage

Mainline Inclusion Requests

Development

  • Disable squashfs fragments in snap
  • PR 4387 – explicitly deny ~/.gnupg/random_seed in gpg-keys interface
  • Submitted PR 4399 for rewrite snappy-app-dev in Go
  • Created PR 4406 – interfaces/dbus: adjust slot policy for listen, accept and accept4 syscalls
  • Reviews
    • PR 4365 – wayland slot implementation

What the Security Team is Reading This Week

Weekly Meeting

More Info

Talk to us today

Interested in running Ubuntu in your organisation?

Newsletter signup

Get the latest Ubuntu news and updates in your inbox.

By submitting this form, I confirm that I have read and agree to Canonical's Privacy Policy.

Related posts

What our users make with Ubuntu Pro – Episode 1

Secure homelabs – and more – for the entire family Ubuntu Pro isn’t just for enterprises – it’s for the passionate community that powers and supports open...

The State of Silicon and Devices – Q2 2025 roundup

Welcome to the Q2 2025 edition of the State of Silicon and Devices by Canonical. In this quarter, we have seen momentum accelerate in edge computing, as well...

JetPack 4 EOL – how to keep your userspace secure during migration

NVIDIA JetPack 4 reached its end-of-life (EOL) in November 2024, marking the end of security updates for this widely deployed stack. JetPack 4 has driven...